Fortifying the Organization Against Image-Based and QR Code Phishing Attacks...
Commissioned by IRONSCALES Published March 2024 Executive summary A striking paradox lies at the heart of modern email security. Despite high levels of confidence among organizations in their...
View ArticleThe Modern Cyberthreat Landscape Demands a Security-Driven Rethink of Backup...
Commissioned by OpenText Published April 2024 Executive summary The modern cyberthreat landscape, with ransomware one of its most pernicious features, has transformed a quiet backroom IT maintenance...
View Article2024 GRC Strategies, Teams, and Outcomes Report – commissioned by LogicGate
Commissioned by LogicGate Published May 2024 Executive summary Governance, risk, and compliance is a team sport — in a league where no two teams look alike. This diversity in team structures,...
View ArticleCybersecurity Perspectives 2024: Enterprises Race to Defend Against...
Commissioned by Scale Venture Partners Published May 2024 Executive summary The shift to the cloud, like most transformational technologies, has been a slow transition over the past decade. In the...
View ArticleBacking Up Cloud Workloads to Achieve Security and Compliance Mandates –...
Commissioned by OpenText Published June 2024 Executive summary Many organizations continue to believe that cloud providers are responsible for protecting their data in SaaS apps from all types of data...
View ArticleSafeguarding Identity Security: We Need to Talk about MFA – multi-sponsor...
Sponsored by Abnormal Security, Enzoic, OpenText, and Token Published September 2024 Executive summary Data breaches and ransomware attacks make headlines every day in the mainstream news. These...
View ArticleEmail Security Threats Against Critical Infrastructure Organizations –...
Commissioned by OPSWAT Released September 2024 Executive summary Organizations in critical infrastructure sectors operate under heightened warnings of cyberattack due to their control of physical...
View ArticleMaking the SOC More Efficient – multi-sponsor white paper
Sponsored by Dropzone AI, HYAS Infosec, Radiant Security, and Sevco Security Published October 2024 Executive summary Security operations centers (SOCs) play a critical vanguard role in defending...
View ArticleUsing AI to Enhance Defensive Cybersecurity – multi-sponsor white paper
Sponsored by Abnormal Security, IRONSCALES, and OpenText Published November 2024 Executive summary The cyberthreat landscape is transforming rapidly as threat actors exploit artificial intelligence...
View ArticlePursuing Operational Excellence with Automation and Orchestration –...
Commissioned by Jitterbit Published December 2024 Executive summary Today’s organizations seek marketplace success in collaboration with an ecosystem of supply chain partners while using hundreds or...
View Article